BLABLE
BLABLE
Within this chapter, the investigators furnish an intricate account of the approaches and
methodologies employed, the demographic representation and selection, the research tools, the
methodologies of data collection, as well as the procedures for data manipulation and statistical
analysis. These aforementioned components offer comprehensive insights into the operational aspects
of this research endeavor.
The research strategy adopted for our study titled "Enhancing Cybersecurity Resilience: An
Investigation into the Effectiveness of an Interactive and Gamified Cybersecurity Education Program for
Students Enrolled in Information and Communication Technology (ICT)" is being conducted at ACLC
College of Malolos. The researchers will employ a quantitative research approach to quantitatively
assess the effectiveness of Interactive and Gamified Cybersecurity Education Program for ICT students.
Quantitative research, as elucidated by (Robinson, 2021), centers on the collection and analysis of
numerical data. In the context of our research, it aligns with descriptive research since its objective is to
accumulate measurable data for the statistical scrutiny of a particular phenomenon – the impact of
multimedia on enhancing vocabulary retention. This approach allows for a comprehensive
comprehension and portrayal of this phenomenon. Descriptive Survey Research, a subset of descriptive
research, blends both quantitative and qualitative data to provide dependable and pertinent insights.
This research strategy, as demonstrated by Harris and (Turner, 2019), offers an efficient approach that
engages individuals central to the research aim. Within this design, multiple variables are explored, and
data is gathered through surveys, observations, and case studies, facilitating the observation, collection,
and analysis of trustworthy and valid responses. This approach focuses on the systematic and precise
characterization of a population, circumstance, or phenomenon. It can address questions pertaining to
what, where, when, and how, although it does not delve into the "why" aspect (Miller, 2018). The
research queries will be thoughtfully devised to align with the research's intended objectives and
purpose at ACLC College of Malolos (Parker, 2020). We will utilize a researcher-created survey
questionnaire in a closed-ended question format, wherein respondents select a single response
alternative, adhering to the guidance of (Chan, 2017).
n = 80/1+80x0.0009
n = 80/1+0.072
n = 80/1.072
n = 74.63 or 74
It's essential to note that the random selection of these 74 students will be conducted across all sections
to uphold fairness in participation opportunities. This approach also considers the possibility of having
varying numbers of students in different sections. Both Information and Communication Technology
(ICT) and Computer Science students will be part of the randomly selected survey participants.
Research Instruments
In this study on Enhancing Cybersecurity Resilience and Education for ICT Students, the
researchers have employed a customized survey questionnaire. It consists of closed-ended questions
structured into four distinct sections, each addressing various aspects of the research problem (Russel
and Hamsfort, 2014). The initial segment includes a Checklist, providing respondents with the option to
select one or multiple responses. This approach facilitates a thorough evaluation of the students' level of
acquaintance with diverse cybersecurity ideas relevant to the study. In the second section, the
researchers have utilized a Likert Scale, a five-point rating system that enables respondents to express
their level of agreement or disagreement with specific statements (Mcmahon, 2021). In the third and
final section, the Likert Scale format is also utilized. The aim here is to evaluate how students interact
with cybersecurity content. Respondents are required to indicate their level of engagement in these
activities using the following scale: 5 = Strongly Agree, 4 = Agree, 3 = Neutral, 2 = Disagree, and 1 =
Strongly Disagree.
The research is conducted at ACLC College of Malolos, specifically focusing on students within the
ICT program. To commence the data collection process, a formal request letter will be submitted to the
college administration, seeking permission to distribute the survey form to the students. Research
operations proceed without any external limitations. The survey form will be electronically created using
Google Forms and distributed after obtaining approval from the Academic Head. Prior to administering
the survey forms, informed consent will be obtained from all participants, including teachers, and the
collected data will be treated with the utmost confidentiality. To gather responses, the researchers will
contact class representatives through private messages to request permission for distributing survey
questionnaires. The responses will be collected from randomly selected students enrolled in the ICT
program across all academic levels. The survey instructions will be made clear and self-explanatory to
avoid any confusion, and respondents can expect the survey to take approximately thirty (20) minutes
to complete, allowing them to allocate the remaining time to other activities.
Within the realm of descriptive statistics, the research will employ the following statistical tools.
Mean, defined by (Weiwen, 2021) as the most commonly utilized measure of central tendency, will be
calculated as the total sum of the dataset divided by the total number of entries. Additionally,
percentage frequency distribution will be employed to systematically represent the data, enabling a
clear depiction of information from data points, typically organized into tables (Smith, 2013). Percentage
frequency distribution will be used to analyze the initial part of the survey questionnaire, aimed at
identifying the cybersecurity concepts with which students in the ICT program are most familiar.
Familiarity will be expressed as a percentage relative to the total responses within each concept. In the
second section, the Mean will be utilized to understand and evaluate the cybersecurity concepts that
most significantly contribute to knowledge retention, as perceived by the respondents. Similarly, in the
third section, Mean will be employed to identify how students assess their knowledge retention based
on the three learning assumptions relevant to cybersecurity education. All the collected data will be
presented in tables to facilitate a more comprehensive interpretation and systematic presentation,
aligning with the approach advocated by (Perrins, 2011), who emphasized that tables serve as effective
tools for visualizing data in the context of descriptive statistics.
Ethical Concerns
During the data collection process, the researchers prioritize the well-being and ethical treatment
of participants. To achieve this, participants are fully informed about the research's purpose and
potential impact, and data collection is strictly voluntary, devoid of stress or harm. Personal information
is held confidential, accessible only to authorized personnel to preserve privacy, and the assessment
solely utilizes relevant information. These safeguards ensure ethical research practices and protect
participants' rights and welfare.